mirror of https://github.com/restic/restic.git
232 lines
5.2 KiB
Go
232 lines
5.2 KiB
Go
|
package fuse_test
|
||
|
|
||
|
import (
|
||
|
"os"
|
||
|
"runtime"
|
||
|
"syscall"
|
||
|
"testing"
|
||
|
|
||
|
"bazil.org/fuse"
|
||
|
"bazil.org/fuse/fs"
|
||
|
"bazil.org/fuse/fs/fstestutil"
|
||
|
"golang.org/x/net/context"
|
||
|
)
|
||
|
|
||
|
func init() {
|
||
|
fstestutil.DebugByDefault()
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSName(t *testing.T) {
|
||
|
if runtime.GOOS == "freebsd" {
|
||
|
t.Skip("FreeBSD does not support FSName")
|
||
|
}
|
||
|
t.Parallel()
|
||
|
const name = "FuseTestMarker"
|
||
|
mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{fstestutil.Dir{}}, nil,
|
||
|
fuse.FSName(name),
|
||
|
)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer mnt.Close()
|
||
|
|
||
|
info, err := fstestutil.GetMountInfo(mnt.Dir)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
if g, e := info.FSName, name; g != e {
|
||
|
t.Errorf("wrong FSName: %q != %q", g, e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func testMountOptionFSNameEvil(t *testing.T, evil string) {
|
||
|
if runtime.GOOS == "freebsd" {
|
||
|
t.Skip("FreeBSD does not support FSName")
|
||
|
}
|
||
|
t.Parallel()
|
||
|
var name = "FuseTest" + evil + "Marker"
|
||
|
mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{fstestutil.Dir{}}, nil,
|
||
|
fuse.FSName(name),
|
||
|
)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer mnt.Close()
|
||
|
|
||
|
info, err := fstestutil.GetMountInfo(mnt.Dir)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
if g, e := info.FSName, name; g != e {
|
||
|
t.Errorf("wrong FSName: %q != %q", g, e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilComma(t *testing.T) {
|
||
|
if runtime.GOOS == "darwin" {
|
||
|
// see TestMountOptionCommaError for a test that enforces we
|
||
|
// at least give a nice error, instead of corrupting the mount
|
||
|
// options
|
||
|
t.Skip("TODO: OS X gets this wrong, commas in mount options cannot be escaped at all")
|
||
|
}
|
||
|
testMountOptionFSNameEvil(t, ",")
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilSpace(t *testing.T) {
|
||
|
testMountOptionFSNameEvil(t, " ")
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilTab(t *testing.T) {
|
||
|
testMountOptionFSNameEvil(t, "\t")
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilNewline(t *testing.T) {
|
||
|
testMountOptionFSNameEvil(t, "\n")
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilBackslash(t *testing.T) {
|
||
|
testMountOptionFSNameEvil(t, `\`)
|
||
|
}
|
||
|
|
||
|
func TestMountOptionFSNameEvilBackslashDouble(t *testing.T) {
|
||
|
// catch double-unescaping, if it were to happen
|
||
|
testMountOptionFSNameEvil(t, `\\`)
|
||
|
}
|
||
|
|
||
|
func TestMountOptionSubtype(t *testing.T) {
|
||
|
if runtime.GOOS == "darwin" {
|
||
|
t.Skip("OS X does not support Subtype")
|
||
|
}
|
||
|
if runtime.GOOS == "freebsd" {
|
||
|
t.Skip("FreeBSD does not support Subtype")
|
||
|
}
|
||
|
t.Parallel()
|
||
|
const name = "FuseTestMarker"
|
||
|
mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{fstestutil.Dir{}}, nil,
|
||
|
fuse.Subtype(name),
|
||
|
)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer mnt.Close()
|
||
|
|
||
|
info, err := fstestutil.GetMountInfo(mnt.Dir)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
if g, e := info.Type, "fuse."+name; g != e {
|
||
|
t.Errorf("wrong Subtype: %q != %q", g, e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TODO test LocalVolume
|
||
|
|
||
|
// TODO test AllowOther; hard because needs system-level authorization
|
||
|
|
||
|
func TestMountOptionAllowOtherThenAllowRoot(t *testing.T) {
|
||
|
t.Parallel()
|
||
|
mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{fstestutil.Dir{}}, nil,
|
||
|
fuse.AllowOther(),
|
||
|
fuse.AllowRoot(),
|
||
|
)
|
||
|
if err == nil {
|
||
|
mnt.Close()
|
||
|
}
|
||
|
if g, e := err, fuse.ErrCannotCombineAllowOtherAndAllowRoot; g != e {
|
||
|
t.Fatalf("wrong error: %v != %v", g, e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// TODO test AllowRoot; hard because needs system-level authorization
|
||
|
|
||
|
func TestMountOptionAllowRootThenAllowOther(t *testing.T) {
|
||
|
t.Parallel()
|
||
|
mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{fstestutil.Dir{}}, nil,
|
||
|
fuse.AllowRoot(),
|
||
|
fuse.AllowOther(),
|
||
|
)
|
||
|
if err == nil {
|
||
|
mnt.Close()
|
||
|
}
|
||
|
if g, e := err, fuse.ErrCannotCombineAllowOtherAndAllowRoot; g != e {
|
||
|
t.Fatalf("wrong error: %v != %v", g, e)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
type unwritableFile struct{}
|
||
|
|
||
|
func (f unwritableFile) Attr(ctx context.Context, a *fuse.Attr) error {
|
||
|
a.Mode = 0000
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func TestMountOptionDefaultPermissions(t *testing.T) {
|
||
|
if runtime.GOOS == "freebsd" {
|
||
|
t.Skip("FreeBSD does not support DefaultPermissions")
|
||
|
}
|
||
|
t.Parallel()
|
||
|
|
||
|
mnt, err := fstestutil.MountedT(t,
|
||
|
fstestutil.SimpleFS{
|
||
|
&fstestutil.ChildMap{"child": unwritableFile{}},
|
||
|
},
|
||
|
nil,
|
||
|
fuse.DefaultPermissions(),
|
||
|
)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer mnt.Close()
|
||
|
|
||
|
// This will be prevented by kernel-level access checking when
|
||
|
// DefaultPermissions is used.
|
||
|
f, err := os.OpenFile(mnt.Dir+"/child", os.O_WRONLY, 0000)
|
||
|
if err == nil {
|
||
|
f.Close()
|
||
|
t.Fatal("expected an error")
|
||
|
}
|
||
|
if !os.IsPermission(err) {
|
||
|
t.Fatalf("expected a permission error, got %T: %v", err, err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
type createrDir struct {
|
||
|
fstestutil.Dir
|
||
|
}
|
||
|
|
||
|
var _ fs.NodeCreater = createrDir{}
|
||
|
|
||
|
func (createrDir) Create(ctx context.Context, req *fuse.CreateRequest, resp *fuse.CreateResponse) (fs.Node, fs.Handle, error) {
|
||
|
// pick a really distinct error, to identify it later
|
||
|
return nil, nil, fuse.Errno(syscall.ENAMETOOLONG)
|
||
|
}
|
||
|
|
||
|
func TestMountOptionReadOnly(t *testing.T) {
|
||
|
t.Parallel()
|
||
|
|
||
|
mnt, err := fstestutil.MountedT(t,
|
||
|
fstestutil.SimpleFS{createrDir{}},
|
||
|
nil,
|
||
|
fuse.ReadOnly(),
|
||
|
)
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
defer mnt.Close()
|
||
|
|
||
|
// This will be prevented by kernel-level access checking when
|
||
|
// ReadOnly is used.
|
||
|
f, err := os.Create(mnt.Dir + "/child")
|
||
|
if err == nil {
|
||
|
f.Close()
|
||
|
t.Fatal("expected an error")
|
||
|
}
|
||
|
perr, ok := err.(*os.PathError)
|
||
|
if !ok {
|
||
|
t.Fatalf("expected PathError, got %T: %v", err, err)
|
||
|
}
|
||
|
if perr.Err != syscall.EROFS {
|
||
|
t.Fatalf("expected EROFS, got %T: %v", err, err)
|
||
|
}
|
||
|
}
|